1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
// Licensed to the Apache Software Foundation (ASF) under one // or more contributor license agreements. See the NOTICE file // distributed with this work for additional information // regarding copyright ownership. The ASF licenses this file // to you under the Apache License, Version 2.0 (the // "License"); you may not use this file except in compliance // with the License. You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. #pragma once #include #include "parquet/encryption/encryption.h" #include "parquet/encryption/file_key_wrapper.h" #include "parquet/encryption/key_toolkit.h" #include "parquet/encryption/kms_client_factory.h" #include "parquet/platform.h" namespace parquet::encryption { static constexpr ParquetCipher::type kDefaultEncryptionAlgorithm = ParquetCipher::AES_GCM_V1; static constexpr bool kDefaultPlaintextFooter = false; static constexpr bool kDefaultDoubleWrapping = true; static constexpr double kDefaultCacheLifetimeSeconds = 600; // 10 minutes static constexpr bool kDefaultInternalKeyMaterial = true; static constexpr bool kDefaultUniformEncryption = false; static constexpr int32_t kDefaultDataKeyLengthBits = 128; struct PARQUET_EXPORT EncryptionConfiguration { explicit EncryptionConfiguration(const std::string& footer_key) : footer_key(footer_key) {} /// ID of the master key for footer encryption/signing std::string footer_key; /// List of columns to encrypt, with column master key IDs (see HIVE-21848). /// Format: "columnKeyID:colName,colName;columnKeyID:colName..." /// Either /// (1) column_keys must be set /// or /// (2) uniform_encryption must be set to true /// If none of (1) and (2) are true, or if both are true, an exception will be /// thrown. std::string column_keys; /// Encrypt footer and all columns with the same encryption key. bool uniform_encryption = kDefaultUniformEncryption; /// Parquet encryption algorithm. Can be "AES_GCM_V1" (default), or "AES_GCM_CTR_V1". ParquetCipher::type encryption_algorithm = kDefaultEncryptionAlgorithm; /// Write files with plaintext footer. /// The default is false - files are written with encrypted footer. bool plaintext_footer = kDefaultPlaintextFooter; /// Use double wrapping - where data encryption keys (DEKs) are encrypted with key /// encryption keys (KEKs), which in turn are encrypted with master keys. /// The default is true. If set to false, use single wrapping - where DEKs are /// encrypted directly with master keys. bool double_wrapping = kDefaultDoubleWrapping; /// Lifetime of cached entities (key encryption keys, local wrapping keys, KMS client /// objects). /// The default is 600 (10 minutes). double cache_lifetime_seconds = kDefaultCacheLifetimeSeconds; /// Store key material inside Parquet file footers; this mode doesn’t produce /// additional files. By default, true. If set to false, key material is stored in /// separate files in the same folder, which enables key rotation for immutable /// Parquet files. bool internal_key_material = kDefaultInternalKeyMaterial; /// Length of data encryption keys (DEKs), randomly generated by parquet key /// management tools. Can be 128, 192 or 256 bits. /// The default is 128 bits. int32_t data_key_length_bits = kDefaultDataKeyLengthBits; }; struct PARQUET_EXPORT DecryptionConfiguration { /// Lifetime of cached entities (key encryption keys, local wrapping keys, KMS client /// objects). /// The default is 600 (10 minutes). double cache_lifetime_seconds = kDefaultCacheLifetimeSeconds; }; /// This is a core class, that translates the parameters of high level encryption (like /// the names of encrypted columns, names of master keys, etc), into parameters of low /// level encryption (like the key metadata, DEK, etc). A factory that produces the low /// level FileEncryptionProperties and FileDecryptionProperties objects, from the high /// level parameters. class PARQUET_EXPORT CryptoFactory { public: /// a KmsClientFactory object must be registered via this method before calling any of /// GetFileEncryptionProperties()/GetFileDecryptionProperties() methods. void RegisterKmsClientFactory(std::shared_ptr kms_client_factory); /// Get the encryption properties for a Parquet file. /// If external key material is used then a file system and path to the /// parquet file must be provided. std::shared_ptr GetFileEncryptionProperties( const KmsConnectionConfig& kms_connection_config, const EncryptionConfiguration& encryption_config, const std::string& file_path = "", const std::shared_ptr<::arrow::fs::FileSystem>& file_system = NULLPTR); /// Get decryption properties for a Parquet file. /// If external key material is used then a file system and path to the /// parquet file must be provided. std::shared_ptr GetFileDecryptionProperties( const KmsConnectionConfig& kms_connection_config, const DecryptionConfiguration& decryption_config, const std::string& file_path = "", const std::shared_ptr<::arrow::fs::FileSystem>& file_system = NULLPTR); void RemoveCacheEntriesForToken(const std::string& access_token) { key_toolkit_->RemoveCacheEntriesForToken(access_token); } void RemoveCacheEntriesForAllTokens() { key_toolkit_->RemoveCacheEntriesForAllTokens(); } /// Rotates master encryption keys for a Parquet file that uses external key material. /// In single wrapping mode, data encryption keys are decrypted with the old master keys /// and then re-encrypted with new master keys. /// In double wrapping mode, key encryption keys are decrypted with the old master keys /// and then re-encrypted with new master keys. /// This relies on the KMS supporting versioning, such that the old master key is /// used when unwrapping a key, and the latest version is used when wrapping a key. void RotateMasterKeys(const KmsConnectionConfig& kms_connection_config, const std::string& parquet_file_path, const std::shared_ptr<::arrow::fs::FileSystem>& file_system, bool double_wrapping = kDefaultDoubleWrapping, double cache_lifetime_seconds = kDefaultCacheLifetimeSeconds); private: ColumnPathToEncryptionPropertiesMap GetColumnEncryptionProperties( int dek_length, const std::string& column_keys, FileKeyWrapper* key_wrapper); /// Key utilities object for kms client initialization and cache control std::shared_ptr key_toolkit_ = std::make_shared(); }; } // namespace parquet::encryption